Analysis

  • max time kernel
    9s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 18:18

General

  • Target

    06eeaf202ca6b3427aa72d4d60458b06fbf1a156ded17a30a9856b2d2baa6b86.exe

  • Size

    7.0MB

  • MD5

    ee62f6b133d214cfcb519f70cd86774c

  • SHA1

    201e826ef70a432c9f7872173870b192a7af068b

  • SHA256

    06eeaf202ca6b3427aa72d4d60458b06fbf1a156ded17a30a9856b2d2baa6b86

  • SHA512

    a914099fb84f42d4517a6c2c1aa84b0d324cb9eee5d2a578784b1c232d2db18f54098508b6d321c34404936f57cc6bb58212c4329291a904e2a8744ccbb41fd9

  • SSDEEP

    98304:emhd1UryeAnQVi19EUGuKKHV7wQqZUha5jtSyZIUbn:elgnT1aUG2H2QbaZtliK

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06eeaf202ca6b3427aa72d4d60458b06fbf1a156ded17a30a9856b2d2baa6b86.exe
    "C:\Users\Admin\AppData\Local\Temp\06eeaf202ca6b3427aa72d4d60458b06fbf1a156ded17a30a9856b2d2baa6b86.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2876
    • C:\Users\Admin\AppData\Local\Temp\97EC.tmp
      "C:\Users\Admin\AppData\Local\Temp\97EC.tmp" --splashC:\Users\Admin\AppData\Local\Temp\06eeaf202ca6b3427aa72d4d60458b06fbf1a156ded17a30a9856b2d2baa6b86.exe 222C75515E5B30F87E1C1974BE7203B7D9C0958E10D6C24963D1A5C3F7E5320E801C082577270A636CD0710F52FBE1B25B3177753ECDFAEED246FD965B9DB138
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:3032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\97EC.tmp

    Filesize

    7.0MB

    MD5

    58e70e55a324d8e1b4d53420467f93ed

    SHA1

    a591673eb6d0ead215c5324bc40514acbb177a00

    SHA256

    2f71bca75287f61779660e42e5b0862d0b619a6fedb40e1bf383c4e8f6dbfb27

    SHA512

    b8fd19086365f924b40def77ecfb007e960abedcbbbea6d7ba8b98bb5f0c75d981785f6a9faaa5bba92bb87d5636ac36172e513678d4ad8db4858492a405f173

  • memory/2876-0-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB

  • memory/3032-9-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB